Search Results - "Umezawa, Katsuyuki"

Refine Results
  1. 1

    Proposal and evaluation by simulation of management processing load control method for virtual client system by Umezawa, Katsuyuki, Goto, Hiromi

    “…In recent years, virtualization of desktops has become important as a solution for various problems caused from the cost of running a company. Our company…”
    Get full text
    Conference Proceeding
  2. 2

    A Proposal of User Authentication Infrastructure for Next-Generation Telematics by Umezawa, Katsuyuki, Susaki, Seiichi, Kashiyama, Masamori, Tezuka, Satoru

    “…To receive a telematics service, it must first be authenticated, and each automobile (or car navigation system) has typically to be linked to a particular…”
    Get full text
    Journal Article
  3. 3

    Evaluation by Questionnaire on Grouped Flipped Classroom Method by Umezawa, Katsuyuki, Ishida, Takashi, Nakazawa, Makoto, Hirasawa, Shigeichi

    “…Flipped classrooms, in which the roles of a classroom lesson and homework are reversed, have recently begun to attract attention. Specifically, the students…”
    Get full text
    Conference Proceeding
  4. 4

    Application and Evaluation of a Grouped Flipped Classroom Method by Umezawa, Katsuyuki, Ishida, Takashi, Nakazawa, Makoto, Hirasawa, Shigeichi

    “…We proposed a new flipped classroom method in which students are divided into three groups before each class on the basis of their e-learning self-study logs…”
    Get full text
    Conference Proceeding
  5. 5

    Analysis of Logic Errors Utilizing a Large Amount of File History During Programming Learning by Umezawa, Katsuyuki, Nakazawa, Makoto, Kobayashi, Manabu, Ishii, Yutaka, Nakano, Michiko, Hirasawa, Shigeichi

    “…We proposed an editing record visualization system that can confirm learner modification of programs by storing a learning log. This system was utilized for an…”
    Get full text
    Conference Proceeding
  6. 6

    Development and evaluation of a certificate validation system in mobile environments by Umezawa, Katsuyuki, Susaki, Seiichi, Tezuka, Satoru, Hirasawa, Shigeichi

    “…We have developed a public key certificate validation system considering the restrictions peculiar to the mobile environment, such as processing the speed and…”
    Get full text
    Journal Article
  7. 7

    A Study on the Relationship Between Brain Waves, Heart Rate, and Facial Expressions During Programming Learning by Umezawa, Katsuyuki, Nakazawa, Makoto, Nakano, Michiko, Hirasawa, Shigeichi

    “…Recently, there have been several on-demand learning systems that are not restricted by learning time or place. However, in these systems, learning content is…”
    Get full text
    Conference Proceeding
  8. 8

    An Effective Flipped Classroom Based on Log Information of Self-Study by Umezawa, Katsuyuki, Aramoto, Michitaka, Kobayashi, Manabu, Ishida, Takashi, Nakazawa, Makoto, Hirasawa, Shigeichi

    “…Flipped classrooms have recently begun to attract attention. In a flipped classroom, the roles of a classroom and homework are reversed. Specifically, the…”
    Get full text
    Conference Proceeding
  9. 9

    Verification of the effectiveness of classes using intermediate content for transitioning from a visual-to a text-based programming language by Umezawa, Katsuyuki, Nakazawa, Makoto, Hirasawa, Shigeichi

    “…In recent years, visual programming languages (VPLs), such as Scratch, have been widely used by programming beginners. Subsequently, learners often transition…”
    Get full text
    Conference Proceeding
  10. 10

    Comparison of Biometric Information During Learning of Visual- and Text-Based Programming Languages by Umezawa, Katsuyuki, Nakazawa, Makoto, Hirasawa, Shigeichi

    “…Novice programmers often start with visual-based programming languages, such as Blockly or Scratch, whereas experts tend to use text-based programming…”
    Get full text
    Conference Proceeding
  11. 11

    Differential Analysis of Heart Rate, Facial Expressions and Brain Wave During Learning of Visual- and Text-Based Languages by Umezawa, Katsuyuki, Koshikawa, Takumi, Nakazawa, Makoto, Hirasawa, Shigeichi

    “…From 2020, programming education has become compulsory in elementary schools. Visual-based programming languages are becoming popular as an introduction to…”
    Get full text
    Conference Proceeding
  12. 12

    Utilizing Automatic Speech Recognition for English Pronunciation Practice and Analyzing its Impact by Umezawa, Katsuyuki, Nakazawa, Makoto, Nakano, Michiko, Hirasawa, Shigeichi

    “…The advancement of AI in recent years has been remarkable, along with the widespread use of speech recognition functions. In addition, an increasing number of…”
    Get full text
    Conference Proceeding
  13. 13

    Evaluation of Applying LDA to Redacted Documents in Security and Safety Analysis by Umezawa, Katsuyuki, Wohlgemuth, Sven, Hasegawa, Keisuke, Takaragi, Kazuo

    “…Cyber attacks are often executed by imitating existing attacks and combining them. Using existing vulnerability databases, we have presented a way to…”
    Get full text
    Conference Proceeding
  14. 14

    Threat analyses using vulnerability databases -Possibility of utilizing past analysis results by Umezawa, Katsuyuki, Mishina, Yusuke, Takaragi, Kazuo

    “…We propose a threat analysis method utilizing topic model analysis and vulnerability databases. The method is based on attack tree analysis. We create an…”
    Get full text
    Conference Proceeding
  15. 15

    A Method of Threat Analysis for Cyber-Physical System using Vulnerability Databases by Mishina, Yusuke, Takaragi, Kazuo, Umezawa, Katsuyuki

    “…Safety and security are major issues for cyber-physical systems. We propose a threat analysis method effective for the design stage of a safety-critical…”
    Get full text
    Conference Proceeding
  16. 16

    Threat Analysis Using Topic Models in Large-Scale Vulnerability Databases and Security Incident Case Documents by Koyanagi, Hiroki, Takaragi, Kazuo, Wohlgemuth, Sven, Umezawa, Katsuyuki

    “…It is crucial to design products bearing security in mind from the initial development stage. Consequently, many threat analysis support tools have been…”
    Get full text
    Conference Proceeding
  17. 17

    Evaluation of Grouped Flipped Classrooms Compared with Three-Year Actual Classes Using a Questionnaire by Umezawa, Katsuyuki, Ishida, Takashi, Nakazawa, Makoto, Hirasawa, Shigeichi

    “…The concept of flipped classroom, in which face-to-face lessons are conducted in school after studying at home, is gaining interest. We proposed the "grouped…”
    Get full text
    Conference Proceeding
  18. 18

    Competitive Compliance with Blockchain by Wohlgemuth, Sven, Umezawa, Katsuyuki, Mishina, Yusuke, Takaragi, Kazuo

    “…Authentication is essential for sharing information in IoT and its secondary use with AI-capable machines. The aim is to support humans in optimizing risk of…”
    Get full text
    Conference Proceeding
  19. 19

    Research Results on System Development of the Research Project of a Self-Study System for Language Learning by Umezawa, Katsuyuki, Nakazawa, Makoto, Kobayashi, Manabu, Ishii, Yutaka, Nakano, Michiko, Hirasawa, Shigeichi

    “…This study proposes to develop a self-study system equipped with an artificial instructor who detects and advises learners and evaluates their language…”
    Get full text
    Conference Proceeding
  20. 20

    An authentication system using smart phones as secure storage by Umezawa, K., Tezuka, S., Hirasawa, S.

    “…The smart phone penetration rate has increased recently. There are also many commercial terminals for receiving network services. When a service is received by…”
    Get full text
    Conference Proceeding